Download PDF
Free download in PDF Cyber Crime Short Questions and Answers for competitive exams. These short objective type questions with answers are very important for Board exams as well as competitive exams like UPSC, SSC, NDA etc. These short solved questions or quizzes are provided by Gkseries.
41
Under which section of IT Act, stealing any digital asset or information is written a cyber-crime.
[A]
65
[B]
65-D
[C]
67
[D]
70
42
What type of attack uses a fraudulent server with a relay address?
[A]
NTLM
[B]
MITM
[C]
NetBIOS
[D]
SMB
43
What port is used to connect to the Active Directory in Windows 2000?
[A]
80
[B]
445
[C]
139
[D]
389
44
Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking.
[A]
Local networking
[B]
Social engineering
[C]
Physical entry
[D]
Remote networking
45
Which Federal Code applies the consequences of hacking activities that disrupt subway transit systems?
[A]
Electronic Communications Interception of Oral Communications
[B]
18 U.S.C. § 1029
[C]
Cyber Security Enhancement Act 2002
[D]
18 U.S.C. § 1030
Answer: Cyber Security Enhancement Act 2002
46
What is the proper command to perform an Nmap XMAS scan every 15seconds?
[A]
nmap -sX -sneaky
[B]
nmap -sX -paranoid
[C]
nmap -sX -aggressive
[D]
nmap -sX -polite
47
What is the purpose of a Denial of Service attack?
[A]
Exploit a weakness in the TCP/IP stack
[B]
To execute a Trojan on a system
[C]
To overload a system so it is no longer operational
[D]
To shutdown services by turning them off
Answer: To overload a system so it is no longer operational
48
What tool can be used to perform SNMP enumeration?
[A]
DNSlookup
[B]
Whois
[C]
Nslookup
[D]
IP Network Browser
Answer: IP Network Browser
49
The first phase of hacking an IT system is compromise of which foundation of security?
[A]
Availability
[B]
Confidentiality
[C]
Integrity
[D]
None of the Above
50
How is IP address spoofing detected?
[A]
Installing and configuring a IDS that can read the IP header
[B]
Comparing the TTL values of the actual and spoofed addresses
[C]
Implementing a firewall to the network
[D]
Identify all TCP sessions that are initiated but does not complete successfully
Answer: Comparing the TTL values of the actual and spoofed addresses
51
A packet with no flags set is which type of scan?
[A]
TCP
[B]
XMAS
[C]
IDLE
[D]
NULL
52
What protocol is the Active Directory database based on?
[A]
LDAP
[B]
TCP
[C]
SQL
[D]
HTTP
53
What are the types of scanning?
[A]
Port, network, and services
[B]
Network, vulnerability, and port
[C]
Passive, active, and interactive
[D]
Server, client, and network
Answer: Network, vulnerability, and port
54
What is the best statement for taking advantage of a weakness in the security of an IT system?
[A]
Threat
[B]
Attack
[C]
Exploit
[D]
Vulnerability
55
Having individuals provide personal information to obtain a free offer provided through the Internet is considered what type of social engineering?
[A]
Web-based
[B]
Human-based
[C]
User-based
[D]
Computer-based
56
Which form of encryption does WPA use?
[A]
Shared key
[B]
LEAP
[C]
TKIP
[D]
None of the above
Please share this page